Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
USB Drives Remain Critical Cyberthreat
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/27/2018 | 3:31:08 PM
Re: USB drives?
Dr.T - you have an interesting style, taking one or two sentences for reply and bumping up about 7 responses.  True tech is FAR more sophisticated now than when 3.5" floppy drives were the world.  True that virus and malware is that much more sophisticated too.  I remember the Anna Kournikovia virus well.  I loved ZORK and those old games that are now long gone.  Some days i actually yearn for DOS 6.22 which was rock solid compared to today.  But the basic idea of taking something out of a pocket and slipping it into a slot and infecting is the same same same.  Just ask Bradley Manning.  
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:14:08 PM
Re: Authorized USB's
Just media changes and the threats are always out there. I agree. Also threats got way sophisticated on that media.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:12:56 PM
Re: Authorized USB's
I remember 20 years ago when we were warned not to put that floppy disk from Uncle Ed into a system That is true, impact was not that big at that time it is huge now.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:11:37 PM
Re: Authorized USB's
You can then take the hardware regex's and white list the auth USB through DLP software or Endpoint A/V software. Yes, that makes sense. Authenticated USB may still be harmful tough.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:10:29 PM
Re: Authorized USB's
o take it one step further for best security practice, your company should have a policy around authorized USB's Or as simple as blocking USB ports so they are not being used.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/27/2018 | 3:09:31 PM
USB drives?
I think it is not only unknown USB drives but the known ones that employees use in their insecure home computer and then plugging it in the work computer. That is a major problem.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/27/2018 | 10:31:51 AM
Re: Authorized USB's
Nothing new here only changing tech.  I remember 20 years ago when we were warned not to put that floppy disk from Uncle Ed into a system and run a program too.  THAT was a danger.  Just media changes and the threats are always out there. 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/26/2018 | 9:47:41 AM
Authorized USB's
The end of the article provides sound advice. To take it one step further for best security practice, your company should have a policy around authorized USB's. You can then take the hardware regex's and white list the auth USB through DLP software or Endpoint A/V software. This will limit the scope of what can be plugged in and executed, in this discussion malware, on your machine.


Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24376
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory w...
CVE-2021-24377
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on t...
CVE-2021-24378
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute w...
CVE-2021-24379
PUBLISHED: 2021-06-21
The Comments Like Dislike WordPress plugin before 1.1.4 allows users to like/dislike posted comments, however does not prevent them from replaying the AJAX request to add a like. This allows any user (even unauthenticated) to add unlimited like/dislike to any comment. The plugin appears to have some...
CVE-2021-24383
PUBLISHED: 2021-06-21
The WP Google Maps WordPress plugin before 8.1.12 did not sanitise, validate of escape the Map Name when output in the Map List of the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue